Upload
mossad-news
View
213
Download
0
Embed Size (px)
Citation preview
7/29/2019 288 GAMMA 201110 FinIntrusion Kit
1/3
www.gammagroup.com
Tactical IT Intrusion Portfolio
FININTRUSION KIT
FINFISHERit intrusion
Feature Overview
Discovers Wireless LANs (802.11) and Bluetooth devices
Recovers WEP (64 and 128 bit) Passphrases within 2-5 minutes
Breaks WPA1 and WPA2 Passphrases using Dictionary Attacks
Actively monitors Local Area Network (Wired and Wireless) and extracts Usernames and
Passwords even for TLS/SSL-encrypted sessions Emulates Rogue Wireless Access-Point (802.11)
Remotely breaks into Email Accounts using Network-, System- and Password-based Intrusion Techniques
Network Security Assessment and Validation
For a full feature list please refer to the Product Specifications.
FinIntrusion Kit was designed and developed by world-
class IT Intrusion specialists, who have over 10 years ofexperience in their area through their work in several TigerTeams (Red Teams) in the private and government sector
assessing the security of different networks and organiza-tions.
The FinIntrusion Kit is an up-to-dateand covert operationalKit that can be used for most common IT Intrusion
Operations in defensive and offensive areas. Currentcustomers include Military CyberWar Departments,Intelligence Agencies, Police Intelligence and otherLaw Enforcement Agencies.
Usage Example 1: Technical Surveillance Unit
The FinIntrusion Kit was used to break the WPA encryptionof a Targets home Wireless network and then monitorhis Webmail (Gmail, Yahoo, ) and Social Network(Facebook, MySpace, ) credentials, which enabled theinvestigators to remotely monitor these accounts fromHeadquarters without the need to be close to the Target.
Usage Example 2: IT Security
Several customers used the FinIntrusion Kit to successfully
compromise the security of networks and computersystems for offensive and defensive purposes usingvarious Tools and Techniques.
Usage Example 3: Strategic Use-Cases
The FinIntrusion Kit is widely used to remotely gain accessto Target Email Accounts and Target Web-Servers (e.g.Blogs, Discussion Boards) and monitor their activities,
including Access-Logs and more.
Usage:
Content:
Strategic Operations
Tactical Operations
Hardware/Software
Break WEP/WPA Encryption
Network Monitoring(including SSL Sessions)
IT Intrusion Attacks
Capabilities:
QUICK INFORMATION
7/29/2019 288 GAMMA 201110 FinIntrusion Kit
2/3
Tactical IT Intrusion Portfolio
FININTRUSION KIT
Product Components
FinIntrusion Kit - Covert Tactical Unit
Basic IT Intrusion Components:
High-Power WLAN Adapter
High-Power Bluetooth Adapter
802.11 Antennas
Many Common IT Intrusion Devices
FinTrack Operation Center
Graphical User Interface for Automated IT Intrusion
Attacks
Automated LAN/WLAN Monitoring
7/29/2019 288 GAMMA 201110 FinIntrusion Kit
3/3
Tactical IT Intrusion Portfolio
FININTRUSION KIT
LAN/WLAN Active Password Sniffer
Captures even SSL-encrypted data like Webmail,
Video Portals, Online-Banking and more